Page 12«..11121314..2030..»

Category Archives: Tor Browser

US CyberDoc DarkSite Servers Removed | Techno | Business | The Voice of the East – Awani Review

Posted: May 16, 2021 at 12:50 pm

S.According to the company, the hacker, who demanded a refund from the colonial pipeline, admitted that the group had lost access to several servers used to host or monetize his blog.

Accessed via the TOR browser on the dark web, the underground version of the Internet, the DarkSite site was inaccessible Friday morning.

A few hours ago, we lost access to the public part of our infrastructure, namely our blog, our paid server and our DoS servers, wrote a hacker using the nickname DarkSup, quoted by Future in an article.

Denial of service (DoS) attacks are aimed at closing a website with a heavy load of traffic.

DarkSup also pointed out that the cryptocurrency funds used to pay the ransom demanded by the hacker group had been withdrawn.

However, a registered future analyst believes Dorskites confession could be a ploy to allow the group to shut down its infrastructure to avoid paying its allies.

According to information from Bloomberg, Which would have paid US $ 5 million to colonial pipeline hackers, is contradictory Washington Post, Who say the company did not pay any money.

A spokesman for the Colonial Pipeline did not respond to requests for comment from the AFP, indicating that an ongoing investigation was ongoing.

Biden management declined to comment when insisting that companies strengthen their IT security.

The attack on the computer systems of the Colonial Pipeline, which carries nearly half of the United States petroleum products from the Gulf of Mexico to the east coast of the United States, forced the operator to suspend all its operations.

This caused panic among many motorists, who rushed to gas stations for fear of petrol shortages.

However, the colonial pipeline said on Thursday evening that it would restart its entire system and resume fuel distribution.

Continue reading here:
US CyberDoc DarkSite Servers Removed | Techno | Business | The Voice of the East - Awani Review

Posted in Tor Browser | Comments Off on US CyberDoc DarkSite Servers Removed | Techno | Business | The Voice of the East – Awani Review

Paedophile teenager tried to ‘cover his tracks’ but failed – Liverpool Echo

Posted: May 14, 2021 at 5:53 am

A teenage paedophile tried to "cover his tracks" after downloading child rape photos at his parents' home.

Jordan Mitchell, then 19, used specialist computer software in an attempt to keep his sick obsession a secret.

He also deleted the disturbing pictures of toddlers and infants being sexually abused after he had viewed them.

But he failed to hide his identity completely and when police raided his home they found 427 indecent images.

Liverpool Crown Court heard police received intelligence that an IP address traced to Mitchell's home was being used to download indecent images.

Derek Jones, prosecuting, said as a result officers raided Mitchell's family's address in Darmonds Green Avenue, Anfield on June 24 last year.

Mr Jones said: "He was in with his parents and the defendant indicated to the police that he knew why they were there."

Officers seized an iPhone and a desktop computer from his bedroom, with the majority of the illegal files being recovered from his mobile.

Mr Jones said: "The defendant was using what he now confirms in his interview was Tor browser to cover his tracks - a VPN.

"He was clearly accessing indecent images on websites, looking at the images and deleting them."

Tor browser software provides access to the 'Dark Web' and can also be used to hide online or other computer activity.

Video Unavailable

Click to playTap to play

Play now

Mr Jones said no record of online searches he had made were present on the devices.

However, he said it could be seen that the then teenager had visited websites with names referring to "Lolita" and "jail bait".

He had 36 Category A - the most serious category showing child rape - 140 Category B and 251 Category C indecent images of children.

Mr Jones said the photos showed children "some as young as between two and four, five to six, six to seven".

The prosecutor said: "He was interviewed by the police and full admissions were made by him to downloading the images.

"He accepted that he used Tor browser to try and cover his tracks when he was looking at these websites."

Mr Jones said sentencing guidelines suggested a starting point of 12 months' custody, with a sentencing range of 26 weeks to three years in custody, for the Category A files.

Mitchell, now 20, who has no previous convictions, admitted four counts of possessing indecent images of children.

Jeremy Hawthorn, defending, said his client entered his guilty plea at the earliest opportunity before magistrates.

Liverpool's courts are some of the busiest in the UK, with a huge variety of cases being heard each week.

To get a behind the scenes look at how they work and the moments that don't make our stories, subscribe to our free weekly Echo Court Files newsletter, written by court reporters Neil Docking and Lauren Wise.

It's free, easy and takes no time at all.

He said Mitchell had "cooperated at all stages", from assisting police when he was arrested to attending a voluntary interview and court when summoned, then taking part in a probation interview by phone, which he said was "potentially the most difficult because you're talking to someone you don't know about something very embarrassing".

Mr Hawthorn said Mitchell had "limited work history" but hoped to become a car mechanic after two years' studying at college in Bootle.

The lawyer added: "He's also a reasonably experienced but self-taught guitar player."

Mr Hawthorn said a pre-sentence report "expressed reservations" about some of Mitchell's attitudes.

He said: "The court will hope whatever attitude problems Mr Mitchell has are ones that are capable of being challenged and rehabilitated."

Mr Hawthorn said the Probation Service recommended Mitchell take part in a Horizon sex offenders treatment programme and added that Mitchell had already "taken steps to use the internet a little bit less compulsively and to make himself more useful around the house, which his mother is doing up".

Judge Anil Murray said the young age of the children pictured was an aggravating feature of the case but in mitigation Mitchell was of previous good character, made admissions, tried to change his lifestyle and hadn't offended since.

He said: "The pre-sentence report says you're remorseful and you show victim empathy. It's thought you're a medium risk of committing further sexual offences but you're unlikely to cause serious sexual harm."

The judge said as he was considered to be "a prospect for rehabilitation" and had no history of failing to comply with court orders, he could suspend his eight-month prison sentence for two years.

He ordered Mitchell to carry out the Horizon programme and a 60-day Rehabilitation Activity Requirement.

Can you help us keep Merseyside covered?

Mitchell must also sign on the Sex Offenders Register and comply with a Sexual Harm Prevention Order for 10 years.

Judge Murray reserved any breaches of the orders to himself and said if he saw Mitchell again, he would likely send him to jail.

For the latest news and breaking news visit http://www.liverpoolecho.co.uk/news/.

Get all the big headlines, pictures, analysis, opinion and video on the stories that matter to you.

Follow us on Twitter @LivECHONews - the official Liverpool ECHO Twitter account - real news in real time.

We're also on Facebook/theliverpoolecho - your must-see news, features, videos and pictures throughout the day from the Liverpool ECHO.

Go here to see the original:
Paedophile teenager tried to 'cover his tracks' but failed - Liverpool Echo

Posted in Tor Browser | Comments Off on Paedophile teenager tried to ‘cover his tracks’ but failed – Liverpool Echo

Over 25% Of Tor Exit Relays Are Spying On Users’ Dark Web Activities – The Hacker News

Posted: May 11, 2021 at 10:56 pm

An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February 2021, a new study on the dark web infrastructure revealed.

"The entity attacking Tor users is actively exploiting tor users since over a year and expanded the scale of their attacks to a new record level," an independent security researcher who goes by the name nusenu said in a write-up published on Sunday. "The average exit fraction this entity controlled was above 14% throughout the past 12 months."

It's the latest in a series of efforts undertaken to bring to light malicious Tor activity perpetrated by the actor since December 2019. The attacks, which are said to have begun in January 2020, were first documented and exposed by the same researcher in August 2020.

Tor is open-source software for enabling anonymous communication on the Internet. It obfuscates the source and destination of a web request by directing network traffic through a series of relays in order to mask a user's IP address and location and usage from surveillance or traffic analysis. While middle relays typically take care of receiving traffic on the network and passing it along, an exit relay is the final node that Tor traffic passes through before it reaches its destination.

Exit nodes on the Tor network have been subverted in the past to inject malware such as OnionDuke, but this is the first time a single unidentified actor has managed to control such a large fraction of Tor exit nodes.

The hacking entity maintained 380 malicious Tor exit relays at its peak in August 2020, before the Tor directory authorities intervened to cull the nodes from the network, following which the activity once again crested early this year, with the attacker attempting to add over 1,000 exit relays in the first week of May. All the malicious Tor exit relays detected during the second wave of the attacks have since been removed.

The main purpose of the attack, according to nusenu, is to carry out "person-in-the-middle" attacks on Tor users by manipulating traffic as it flows through its network of exit relays. Specifically, the attacker appears to perform what's called SSL stripping to downgrade traffic heading to Bitcoin mixer services from HTTPS to HTTP in an attempt to replace bitcoin addresses and redirect transactions to their wallets instead of the user-provided bitcoin address.

"If a user visited the HTTP version (i.e. the unencrypted, unauthenticated version) of one of these sites, they would prevent the site from redirecting the user to the HTTPS version (i.e. the encrypted, authenticated version) of the site," the maintainers of Tor Project explained last August. "If the user didn't notice that they hadn't ended up on the HTTPS version of the site (no lock icon in the browser) and proceeded to send or receive sensitive information, this information could be intercepted by the attacker."

To mitigate such attacks, the Tor Project outlined a number of recommendations, including urging website administrators to enable HTTPS by default and deploy .onion sites to avoid exit nodes, adding it's working on a "comprehensive fix" to disable plain HTTP in Tor Browser.

"The risk of being the target of malicious activity routed through Tor is unique to each organization," the U.S. Cybersecurity Security and Infrastructure Security Agency (CISA) said in an advisory in July 2020. "An organization should determine its individual risk by assessing the likelihood that a threat actor will target its systems or data and the probability of the threat actor's success given current mitigations and controls."

"Organizations should evaluate their mitigation decisions against threats to their organization from advanced persistent threats (APTs), moderately sophisticated attackers, and low-skilled individual hackers, all of whom have leveraged Tor to carry out reconnaissance and attacks in the past," the agency added.

Excerpt from:
Over 25% Of Tor Exit Relays Are Spying On Users' Dark Web Activities - The Hacker News

Posted in Tor Browser | Comments Off on Over 25% Of Tor Exit Relays Are Spying On Users’ Dark Web Activities – The Hacker News

Joy-Anna Duggar & Husband Austin Forsyth Break Silence On Brother Josh Duggar’s Child Pornography Arrest: The Accusations ‘Sadden Us To Our Core’…

Posted: at 10:56 pm

Article continues below advertisement

As OK! reported, Josh was arrested on Thursday, April 29, and was detained without bail. During his arraignment hearing one day later, his attorney pleaded not guilty to two federal charges of receipt and possession of child pornography. He was released on Thursday, May 6, and is awaiting his July 6 trial. His pretrial is set for July 1.

On Saturday, May 8, Joy-Anna took to her Instagram Story, on behalf of her and Austin, to issue a statement regarding the troubling charges brought against her brother. While keeping their message vague, the couple said they are trying to process the recent controversy and condemned any form of child abuse.

Article continues below advertisement

Source: Joy Forsyth/Instagram; Washington County Sheriff/MEGA

"The recent accusations brought against Josh sadden us to our core," their statement read. "We have not wanted to be hasty in making any statements while trying to process the news ourselves. We are especially heartbroken by the reality that there are children in the world being harmed and exploited."

Article continues below advertisement

"We ask for prayer for all those involved," Joy-Anna and Austin concluded, "and it is our continued prayer that the truth comes to light."

Article continues below advertisement

Josh was released from Washington County Detention Center in Fayetteville, Ark., last week after his virtual detention hearing on Wednesday, May 5. At the time, Judge Christy Comstock granted his bail but refused to allow him to return in his family home, where his six minor children live. In the meantime, Josh's family friends, pastor LaCount Reber and Maria Reber, agreed to house him until his trial next month.

The 19 Kids and Counting star also cannot be around other children and will be monitored by a GPS. However, Josh will be allowed to visit his children as long as his wife, Anna who is pregnant with the couple's seventh child is present.

Article continues below advertisement

As OK! reported, Anna announced the couple's seventh bun in the oven days before Josh was arrested in connection to a May 2019 Homeland Security raid on his Arkansas car dealership as part of an "ongoing federal investigation."

During his detention hearing last week, Homeland Security Investigations special agent Gerald Faulkner alleged that Josh downloaded files depicting child sex abuse on May 14, 15 and 16 of 2019, which were allegedly flagged and traced back to his IP address on a computer from his car dealership.

Article continues below advertisement

During the raid and before Josh knew what the agents were investigating he allegedly asked: "What is this about? Has someone been downloading child pornography?" When asked about the content of children reportedly ages 5-10 allegedly found during the federal investigation, Josh responded: "I'd rather not answer that question," Faulkner claimed.

Article continues below advertisement

The investigators also uncovered a program, Covenant Eyes, that was installed onto his computer, which would alert his wife when objectionable content was being searched for. However, the site was apparently unable to detect Josh's internet usage after he installed a password-protected network on his computer, the agent said during the virtual hearing.

Josh reportedly admitted that he had a TOR browser on his computer, allowing him to access the dark web (which is used for child pornography, Faulkner explained). There was reportedly no evidence that it was him who downloaded the browser.

Article continues below advertisement

The 33-year-old faces up to 20 years behind bars and $250,000 in fines on each count if convicted.

Josh was previously under fire in 2015 when a 2006 police report was released, revealing he had been investigated as a teen for molesting five underage girls. His sistersJill, 29, andJessa, 28, reportedlystepped forward as two of the victims.

Originally posted here:
Joy-Anna Duggar & Husband Austin Forsyth Break Silence On Brother Josh Duggar's Child Pornography Arrest: The Accusations 'Sadden Us To Our Core'...

Posted in Tor Browser | Comments Off on Joy-Anna Duggar & Husband Austin Forsyth Break Silence On Brother Josh Duggar’s Child Pornography Arrest: The Accusations ‘Sadden Us To Our Core’…

Pornography consumption has become widespread among young netizens, study – Hindustan Times

Posted: at 10:56 pm

Nearly four-fifths of 16 and 17-year-olds have encountered pornographic content on the Internet, which is a multibillion-dollar business.

Pornographic content is virtually ubiquitous on the Internet, and surveys suggest that 25 per cent of all searches lead to explicit content. Given the size of the market, it's not surprising that young people are drawn to such sites, which are only a couple of clicks away. The study was published in the journal Policy and Internet.

Professor Neil Thurman of the Department of Media and Communication (IfKW) at Ludwig-Maximilians-Universitaet (LMU) in Munich, in collaboration with statistician Fabian Obster (Universitat der Bundeswehr Munchen), has carried out a study on the use of pornographic sites by young people. Based on a survey involving a sample of 1000 British adolescents, the survey also provides pointers for regulators and legislators in Germany.

Overall, 78 per cent of users between the ages of 16 and 17 reported that they had encountered pornography on the Internet. Moreover, many of them stated that they visited dedicated pornographic websites frequently. Those who participated in the survey admitted that, on average, they had last visited such sites 6 days prior to filling in the questionnaire.

Many respondents said they watched porno videos and viewed picture galleries on that very day. Analysis of the responses indicated that adolescents spent an average of 2 hours per month on commercial pornographic websites, almost always accessed on their smartphones or tablets.

The survey also revealed that young consumers are also turning to social media portals for access to explicit material. Adolescent users of online pornography are more likely to be male.

Well acquainted with VPNs and the Tor browser

In Germany, the UK, France and Canada, efforts are now underway to regulate access to legal online pornography, and in some cases measures have already been implemented. These include provisions for mandatory age verification prior to the admission of users to such websites.

But, according to Thurman's survey, around half of the respondents had used VPNs or the Tor browser. Both tools anonymize connection data, thus allowing country-specific restrictions to be circumvented.

"At present, the online pornography market is highly concentrated. It is dominated by a few global firms. Indeed, only a handful of websites account for the majority of consumption," Thurman says.

In the context of measures to protect minors, he therefore suggests that, in additional to country-specific measures, there should also be pressure placed on the major global publishers of pornography, to encourage them to introduce effective age restrictions in all the markets in which they operate. In addition, similar regulations should be applied, as is already happening in the UK, to social-media platforms.

Follow more stories on Facebook and Twitter

Go here to see the original:
Pornography consumption has become widespread among young netizens, study - Hindustan Times

Posted in Tor Browser | Comments Off on Pornography consumption has become widespread among young netizens, study – Hindustan Times

5 ways to keep your online searches private in the digital age – KTAR.com

Posted: May 9, 2021 at 11:20 am

(Unsplash Photo)

Google processes over 40,000 searches every single second, according to InternetLiveStats.com. Did you know that there are some things you should never search for? Tap or click for seven Google searches that can land you in serious trouble.

For your more embarrassing or private queries, you may think youre protecting yourself entirely with incognito mode, but that only goes so far. Tap or click here to see what incognito mode is really good for and what it cant do.

Lets take a closer look at the privacy options available to you. This post should be required reading for anyone in todays digital age. So, be sure to share it out on your social media accounts.

1. Know what private windows do

In most browsers, select File > New Private Window or hit the three-dot menu near the search bar to open a new incognito or private window. Heres where a lot of people fall for this privacy myth.

Dont make a mistake and think this privacy feature blocks what you search or sites you visit from your internet provider, work or school, or even a search engine. A private window only wipes out local data like your search history, cookies, and anything you entered into a form.

2. Stop searching using Google

If you dont want to be tracked, use an alternative to Google.

StartPage calls itself the worlds most private search engine. The Netherlands-based company pays Google for the use of its search algorithm but strips out the tracking and advertising that usually comes along with it. You get a Google-like experience, along with the promise that your data will never be stored, tracked, or sold.

Test it out at startpage.com. You can also set StartPage as your browsers default search engine.

DuckDuckGo is another option that doesnt track you the way Google does. It doesnt allow targeted advertising, results are not based on your search history, and youll see fewer ads based on your search.

Its easy to use and install, too, with an extension that plugs in with all the major browsers. You can also search at duckduckgo.com.

Want more? Tap or click for more search alternatives to Google that respect your privacy.

3. Wipe your browsing history

Aside from being tracked by companies and your ISP, there are other reasons you dont want people to see your browser history. Perhaps you need to look up something private (and embarrassing) or not want to spoil a surprise. Clearing things out takes a few clicks in your browser of choice.

There are steps to follow for each browser and even your social media accounts. Tap or click here for all the steps you need for Chrome, Firefox, Edge, Safari, and more.

4. Hide yourself with a VPN

A virtual private network, or VPN, is a layer of protection between your devices and the internet. It hides your IP address and your location, and its the most effective way of keeping yourself private online.

Think about everything you have to protect. The products you look up, medical conditions you search for, people you Google its all compiled into the dossier about you.

A VPN sends your internet traffic through an encrypted tunnel, effectively blocking your identity. Without one, youre handing over a ton of information to the sites you browse and apps you use, along with your ISP, your mobile carrier, and anyone else who goes snooping.

A word of caution: Some VPNs track you or, worse, collect and sell your data just like all the companies youre trying to avoid. Many cheap or free VPNs make money by selling your data to ad companies, so do your research. I use and recommend ExpressVPN, a sponsor of my national radio show.

5. Use a privacy-focused browser

You can go a step further and download the Tor Browser. You may know Tor as the browser used to access the Dark Web. That doesnt mean its nefarious by nature.

Wondering whats on the Dark Web? Tap or click here for steps on how to access it as well as what youll find.

With Tor, your browser history and cookies are cleared after every browsing session. It also unblocks restricted websites and encrypts every website three times before you visit it. You can download or learn more about Tor here if youre interested.

If it feels like your privacy is tough to hold onto, well, youre right. But you can take steps to secure yourself. With a bit of effort, you can keep Big Tech and advertisers out of your business.

What digital lifestyle questions do you have? Call Kims national radio show and tap or click here to find it on your local radio station. You can listen to or watch The Kim Komando Show on your phone, tablet, television or computer. Or tap or click here for Kims free podcasts.

Read more:
5 ways to keep your online searches private in the digital age - KTAR.com

Posted in Tor Browser | Comments Off on 5 ways to keep your online searches private in the digital age – KTAR.com

Browse The Intercept Using Our New Tor Onion Service – The Intercept

Posted: April 29, 2021 at 12:42 pm

Websites that end in .onion are known as Tor onion services or if you want to be dramatic about it, the dark web. Heres how it all works.

When you load a website in a normal web browser like Chrome, Firefox, Safari, or Edge, you make a connection over the internet directly from your house (or wherever you happen to be) to the web server youre loading. The website can see where you are coming from (and track you), and your internet service provider can see which website youre loading (and track what youre doing and sell advertising based on your activity).

But if you open Tor Browser and load the same website, none of those parties can spy on you. Even Tor itself wont know what youre up to. Within the network, consisting of thousands of nodes run by volunteers across the internet, you do not connect from your house directly to the web server. Instead, your connection first bounces between three Tor nodes and then finally exits the Tor network and goes to the website. The website cant see where youre coming from, only that youre using Tor. Your ISP cant see what website youre visiting, only that youre using Tor. And the Tor nodes themselves cant fully track you either. The first node can see your home IP address, because you connect directly to it, but cant see what site youre loading, and the last node (also called the exit node) can see what site youre loading but doesnt know your IP address.

In short, Tor Browser makes it so people can load websites anonymously. Tor onion services do the same thing, except for websites themselves.

So what exactly is an onion service? Just like when people use Tor Browser to be anonymous, web servers can use Tor to host anonymous websites as well. Instead of using normal domain names, these websites end with .onion.

If you load an onion site in Tor Browser, both you and the web server bounce encrypted data packets through the Tor network until you complete an anonymous connection, and no one can track anyone involved: Your ISP can only see that youre using Tor, and the websites ISP can only see that its using Tor. You cant learn the websites real IP address, and the website cant learn yours either. And the Tor nodes themselves cant spy on anything. All they can see is that two IP addresses are both using Tor.

Onion services have another cool property: The connection never exits the Tor network, so there are no exit nodes involved. All the communication between Tor Browser and the web server happens in the dark.

When people hear about the dark web, they tend to think about shady things like drug markets and money laundering. That stuff is, in fact, facilitated by anonymous websites running Tor onion services, just as its facilitated by the normal, non-anonymous internet. But its not the only use of onion services by a long shot.

The Intercept along with dozens of other newsrooms around the world, including pretty much every major news organization, run Tor onion sites for SecureDrop, a whistleblower submission platform. With The Intercepts new onion service for readers of our website, well also join the ranks of the New York Times, ProPublica, BuzzFeed News, The Markup, and other news organizations in making their core websites available as onion services.

I also develop an open source tool called OnionShare which makes it simple for anyone to use onion services to share files, set up an anonymous drop box, host a simple website, or launch a temporary chat room.

But, by far, the most popular website on the dark web is Facebook. Yup, Facebook has an onion service. For when you want some but not too much anonymity.

Continue reading here:
Browse The Intercept Using Our New Tor Onion Service - The Intercept

Posted in Tor Browser | Comments Off on Browse The Intercept Using Our New Tor Onion Service – The Intercept

Has Google "FLoCed" you? This website lets you know if your browser is using the new tech – TechRepublic

Posted: at 12:42 pm

The Electronic Frontier Foundation has a website that "will tell you whether your Chrome browser has been turned into a guinea pig" for the Federated Learning of Cohorts.

Image: GettyImages/gremlin

Google's Federated Learning of Cohorts (FLoC) trial is underway in select areas around the globe. The tracking system has drawn scrutiny for privacy and security concerns. In fact, the Electronic Frontier Foundation (EFF) created a website to let people know if they've been "FLoCed." So how does FLoC work and how is this system different than the old cookie-based method? And, most importantly, how do you know if you've been "FLoCed"?

SEE:Electronic Data Disposal Policy(TechRepublic Premium)

In March, Google published a blog post announcing the initial rollout of a Chrome "developer origin trial" for its Federated Learning of Cohorts (FLoC) tracking system. The company said the technology "is still in development" and expects FLoC to "evolve based on input from the web community and learnings from this initial trial."

The FLoC rollout has drawn plenty of pushback in recent weeks. TechRepublic's sister site, ZDNet, previously reported a WordPress Core proposal to block FLoC as well as browser Brave disabling the tracking system.

In an article titled "Google's FLoC is a Terrible Idea," the EFF said that "no one should mourn the death of the cookie as we know it," stating the third-party tracking tool has "been the lynchpin in a shadowy, seedy, multi-billion dollar advertising-surveillance industry on the Web."

The EFF also created amifloced.org which the organization says "will try to detect whether you've been made a guinea pig in Google's ad-tech experiment."

Companies have taken measures to block third-party cookies, including browsers Safari and the Tor Browser, as ZDNet reported last spring. In 2019, Google announced its Privacy Sandbox initiative and outlined challenges associated with blocking cookies, explaining that doing so encourages other techniques a la fingerprinting in which a person's device or installed fonts "generate a unique identifier" to match people online.

Additionally, without providing an alternative way for publishers to "deliver relevant ads," blocking cookies reduces funding for publishers and, in turn, "jeopardizes the future of the vibrant web," Google explained.

Instead, FLoC provides a "viable advertising business model" for publishers and boosts privacy, Google said in the March blog post.

The company said FLoC maintains individual anonymity and allows publishers to present ads to "large groups" of web browsers which it calls "cohorts" who are "defined by similarities in browsing history, but they're not based on who you are individually."

Once grouped with "thousands of other people," Gooogle said the specific group's identification number is the "only thing provided when requested by a site" explaining this is different from the third-party cookie approach which enables companies to track people "individually across different sites."

SEE:Snowflake data warehouse platform: A cheat sheet (free PDF)(TechRepublic)

An initial FLoC test is underway involving a "small percentage of users" across the U.S., New Zealand, Australia, Canada, Brazil, India, Japan, Mexico, Indonesia and the Philippines with the tech coming to other areas as the trial expands, according to Google. The company said it would introduce a Chrome Settings control in April allowing people to opt-out of Privacy Sandbox proposals including FLoC.

Learn the latest news and best practices about data science, big data analytics, and artificial intelligence. Delivered Mondays

View post:
Has Google "FLoCed" you? This website lets you know if your browser is using the new tech - TechRepublic

Posted in Tor Browser | Comments Off on Has Google "FLoCed" you? This website lets you know if your browser is using the new tech – TechRepublic

Six reasons you should be switching to the Brave browser – htxt.africa

Posted: at 12:42 pm

Something that might not seem important is your choice of browser. Google Chrome, Microsoft Edge and Opera, are all just iterations of the same thing right?

If that thing is Chromium, then yes you would be correct, but all of these browsers employ variations on Chromium that make them unique while still using the same DNA. In fact, once you start digging into these browsers youll find they all behave and collect data differently.

But there is a Chromium-based browser that we love for many reasons and wed urge our readers to start using. That browser is Brave and having used it since version 1.0 was released in November 2019, weve never felt the need to switch to another browser.

The browser claims to put you back in control of your data by blocking intrusive ads and trackers by default. After nearly two years of using Brave, were starting to see what the internet would look like if companies didnt bid for every morsel of our data.

We know you need more than that though, so here is why we think you should switch to Brave.

As mentioned in our preamble, Brave allows you to install applications from the Chrome Web Store which is great if like us, you have a number of app extensions you use everyday.

The other benefit is that when new extensions are released, so long as you have updated Brave to the most recent version of Chromium, you should be able to use those extensions.

For example, if you hate the new Google Suite icons, there is a browser extension for Chrome, and by extension Brave, that you can use to switch them back to the older, more familiar icons.

One of the benefits of blocking trackers and advertising by default is that websites will load faster as they dont have to prime all the features that follow you around.

In reality this time saving is minimal. Following a format of our PC in January and reinstalling Brave, we have saved just under 24 hours we wouldve spent waiting for pages to load.

When comparing Chrome, Opera and Firefox to Braves loading times on YouTube (with a Premium subscription that removes advertising) the page loads slightly faster on Brave but not so fast youll notice it immediately.

The most important feature in Brave is located right in the omni-bar and it is called Shields.

This is, for all intents and purposes, Braves ad-blocker though just calling it an adblocker does it a disservice.

Shields does a number of things including:

Unfortunately, Brave is so good at blocking these that some websites just wont work because the browser is blocking pop-ups and the like. For example, a payment platform refused to move us to the next step because that step came in the form of a pop-up, which Brave blocked.

Thankfully, switching Shields on and off is as simple as clicking a button and Brave will remember to keep Shields switched off for that website.

You can also set how aggressively you want Brave to block trackers and advertising

One of the features of Brave often used to entice new users is the fact that you can earn money for just browsing.

While that is true, its also stretching what you the user needs to endure.

The adverts you see are delivered as desktop notifications that will appear constantly while the browser is open. Playing a game with Brave open? Get an advert. On a call with Brave open? Get an advert.

For this you will earn Basic Attention Tokens (BAT) which you can deposit into your wallet and use for a number of things.

You can of course have Brave deposit BAT into your wallet every month or you can have Brave divide your earnings up and send it to creators you want to contribute to.

Dont expect to earn huge amounts though, throughout April weve earned $2.84 and quite honestly its not worth the constant barrage of adverts we endured.

Right, before we dive into this if you are using the Tor network for serious reasons such as trying to evade a dangerous government or you are seriously trying to remain private, you should use the Tor browser directly from the Tor project.

We say this because unfortunately, in February it was discovered that the Tor feature was leaking .onion URLs visited by users. This has since been fixed but rather safe than sorry right?

If, however, you simply want to browse the dark web and see what there is to see, Brave is a convenient way to do that without having to download a separate browser. Just note that the speed benefits we mentioned earlier disappear when using Tor.

In addition you can also set Brave up to use DuckDuckGo by default in incognito mode for an extra layer of privacy.

The Federated Learning of Cohorts or FLoC is a term you may have encountered in recent weeks.

This is because its a new way to serve ads that Google is proposing by framing it as a positive.

Rather than targeting ads based on your individual preferences, FLoC puts users into groups and targets groups rather than an individual.

How is this a bad thing? Brave explains.

Say I run a website selling polka music, and I serve a dedicated community of die-hard polka fans. My site is successful because Ive identified a niche market that is poorly served elsewhere, which allows me to charge higher than, say, Amazon prices. However, FLoC may stick users browsing in Chrome in a polka music lover cohort, and begin having my users broadcast their polka love to other sites, including Amazon. Amazon could then peel off my polka-record buyers, leaving me worse off, the firm explains.

Brave argues that FLoC could mean worse privacy for you and not better as Google would have you believe.

Many similar examples are possible, but the general point is that FLoC will have your users broadcast their interest in your site (and sites like your site) to unrelated sites on the Web. Those other sites may use this information to engage in forms of price discrimination, or otherwise more aggressively market to your users. Programmatic ad-tech has done exactly this for years, and FLoC would continue this practice into the post third-party cookies era, adds Brave.

Brave isnt alone in this blocking of FLoC thankfully. Microsoft, Mozilla, Apple and even Opera have expressed a dislike for this method of tracking.

Brave is blocking FLoC right out of the gate and so if you needed any reason to switch, this is a rather good one.

Brave is available to download for free on Windows, macOS (Intel and ARM64 iterations), Linux, iOS and Android.

See the rest here:
Six reasons you should be switching to the Brave browser - htxt.africa

Posted in Tor Browser | Comments Off on Six reasons you should be switching to the Brave browser – htxt.africa

Mobikwik user data has leaked, here is what happened and this is what you should do next – India Today

Posted: March 31, 2021 at 3:20 am

In what is believed to be one of the worst cases of data leaks, important information of 9.9 crore Mobikwik users has been leaked online, which the digital payments company has denied. The disclosure about the data leak was made by cybersecurity analyst Rajashekhar Rajaharia who has also written to the Reserve Bank of India, Indian computer emergency response team, PCI Standards, and payment technology firms, etc.

Mobikwik has denied these claims saying that it is a regulated entity and takes security very seriously. The platform claimed that it is closely working with requisite authorities on this matter, and considering the seriousness of the allegations will get a third party to conduct a forensic data security audit.

The recent data leak is of serious nature as it is said to have exposed important user information including mobile phone number, bank account details, email, and even credit card numbers of 9.9 crore Mobikwik users. The screenshots of the Mobiwik breach were posted on Twitter by French security researcher who goes by the name Elliot Alderson. He called it the largest KYC data leak in the history.

Even though Mobikwik has denied this leak, there are number of reasons to believe that a breach was made. First, a group of hackers by the name of Jordandaven emailed the link of the database to PTI. They shared the data of Mobikwik founder Bipin Preet Singh and Mobikwik CEO Upasana Taku from the database.

The hackers have maintained that they only want to get money from the company and do not plan to use it otherwise.

However, several users have posted screenshots of Mobiwik users' data put up for sale on dark web. In some cases, this data was being sold for 1.5 bitcoin or about $86,000. Again, the platform has denied the claims.

There is another report claiming that a separate dark web portal has been created which can be used to search data by phone number or email ID and get the specific results out of a total of 8.2 TB of data. Just the sheer size of data uploaded on the portal is alarming.

The payments solution platform has shrugged away the claims of this data leak and has put the blame on users. In a response put out on Tuesday, the platform claimed that all accounts and user information with it were completely safe.

Some users have reported that their data is visible on the dark web. While we are investigating this, it is entirely possible that any user could have uploaded her/his information on multiple platforms. Hence, it is incorrect to suggest that the data available on the darkweb has been accessed from MobiKwik or any identified source, the statement read.

This isnt the first time when the company has denied these claims. The matter was first brought to light last month by the same security researcher. Back then, Mobikwik had denied these claims and announced that it will take action against the researcher. It hasnt revealed if a complaint has been filed since.

We thoroughly investigated his allegations and did not find any security lapses. Our user and company data is completely safe and secure. The various sample text files that he has been showcasing prove nothing. Anyone can create such text files to falsely harass any company. Finally, our legal team will be pursuing strict action against this so-called researcher who is trying to malign our brand reputation for ulterior motives, MobiKwik had said on Twitter.

The ongoing tussle between the platform and the researcher leaves Mobikwik users with lot of uncertainty and confusion. Even though the matter will be investigated over the next few days, the users are advised to update their Mobikwik account with new passwords. They should also update passwords to email addresses, setup two-factor authentication (2FA) including OTPs and fixed passcodes, wherever possible.

If you want check if your data is part of the leak, download Tor browser. It a free and open-source web browser that helps you anonymously browse the web. Open this link to access Mobikwik data put online. Search using your name or number to see if it is listed. If nothing shows up, you are safe. If information pops up, then immediately contact your bank and block your cards.

Update The hacker group which set up the website to showcase the stolen data from Mobikwiks servers has pulled it down from the website, claiming that all of it has been deleted from their servers and the users are now safe.

Read more here:
Mobikwik user data has leaked, here is what happened and this is what you should do next - India Today

Posted in Tor Browser | Comments Off on Mobikwik user data has leaked, here is what happened and this is what you should do next – India Today

Page 12«..11121314..2030..»